Results 51 to 60 of about 1,901,421 (313)
On Some Cryptographic Protocol
In this paper we present a cryptographic protocol for a seller - buyer problem and in particular we prove that non-emptiness of a semi-commutative set defined by mappings involved in the protocol is a decidable problem.
openaire +3 more sources
Abstracting cryptographic protocols with tree automata [PDF]
zbMATH Open Web Interface contents unavailable due to conflicting licenses.
David Monniaux, David Monniaux
openaire +3 more sources
Automated Cryptographic Analysis of the Pedersen Commitment Scheme
Aiming for strong security assurance, recently there has been an increasing interest in formal verification of cryptographic constructions. This paper presents a mechanised formal verification of the popular Pedersen commitment protocol, proving its ...
Dong, Changyu, Metere, Roberto
core +1 more source
Formal Verification of Security Protocol Implementations: A Survey [PDF]
Automated formal verification of security protocols has been mostly focused on analyzing high-level abstract models which, however, are significantly different from real protocol implementations written in programming languages.
A Bauer +27 more
core +2 more sources
The Practice of Cryptographic Protocol Verification
We analyze the complexity of verifying security protocols for finite ...
openaire +3 more sources
Post Quantum Cryptography from Mutant Prime Knots
By resorting to basic features of topological knot theory we propose a (classical) cryptographic protocol based on the `difficulty' of decomposing complex knots generated as connected sums of prime knots and their mutants.
Adams C. +13 more
core +1 more source
Cryptographic protocols with everyday objects [PDF]
Abstract Most security protocols appearing in the literature make use of cryptographic primitives that assume that the participants have access to some sort of computational device. However, there are times when there is need for a security mechanism to evaluate some result without leaking sensitive information, but computational devices are ...
Heather, J, Schneider, S, Teague, V
openaire +4 more sources
Quantum Emitters in Hexagonal Boron Nitride: Principles, Engineering and Applications
Quantum emitters in hexagonal boron nitride have emerged as a promising candidate for quantum information science. This review examines the fundamentals of these quantum emitters, including their level structures, defect engineering, and their possible chemical structures.
Thi Ngoc Anh Mai +8 more
wiley +1 more source
How to Formalize Loop Iterations in Cryptographic Protocols Using ProVerif
The formal verification of cryptographic protocols has been extensively studied in recent years. To verify the cryptographic protocol security, formal verification tools consider protocol properties as interactive processes involving a cryptographic ...
Takehiko Mieno +3 more
doaj +1 more source
An Improved Key Agreement Protocol Based on Fractal Theory [PDF]
A key agreement protocol is a key establishment technique which enables two or more communicating parities to agree on a key or exchange information over an open communication channel.
Nadia M. G. Al-Saidi
doaj +1 more source

